Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out

اهمية التوعيه الامنيه

VIEWS: 7 PAGES: 5

Security Awareness Importance اهمية التوعيه الامنيه      

More Info
  • pg 1
									         Security Awareness Importance

                 ! "                   #!
             + $ *                            $%                                     ! & '                 (            )'

,       ! $            -   $           )               .           /0.       1           $                                   2!
                                                  +3            40 1              54 '           6              7        ,

                                             +3 2                     $                      -            !       ( 8
             + ;.              "             ! :                  & ' ".         & / !                    "9     " 8
                                [9][1][2][5]+< !                    / =                      !             !    6 8

             @ .           $            $ 2            '              '      .                       5? 9 8
                                                                                                      >        / !
                                                                                                   + $
                                                                               +    A     $9 A <            8
                                                                                        +DoS . / "! 8
    +3       B     <           /                  C "                 D    B      < ! 7           E= &      8
                                                                                      +       54 '          8
                                                                                         :      'F          8
        I'                     <       <      H             G          (    B 7 .= /      6" . /        ;
                                                           +          'F      /0.     ' ;        (E     ?JD


    ? 4'           ! /  / =                                     / E C"      )'                                  #! 3
              +       $ % < ? 'F <                              C " A                                      8 :@ .   $
    2           G
             .K J ( 7.= /E E                                $     . & '                              ( *       )      8
                        +I++ / "                             $ L        ' H    /                       A +     @
@            4      L ". @       )                          2 #!      ;! & ! '                        $       /!    E
                                                                                                      + $         &

                                                             "#    $%                         !
                                              +, !             $ 2 /!           B 7 .=     E 8
                                             +E =        M" / !      6 < !          0!       8
                                                                 + $    >. < !        3 9    8
    C 9                <                    E /E =     29 * D         <$ 0    "    /E = / ' 8
                                                                           + $ 5 E       6 .
                                   +              '       $ 2 <0 ! .N < (        /   ! / ' 8

                                                                                           ( )* +   &   '
2        $        /0.      < ! $                                   -     ! @          =         6 2 )'
5       /E       O 5 ; 2 9 ;F L $                                 E L "         $     G ! $           < E
                                                                  [6]+(Password GuessingH+ '     G  EJ2
                                                                         ,       '                             +
         3    )        &'       L           !   $  2 )'                                  <      '
& '    4 9 ! P"                  EQ        $ * / R'F * ;                              6 ?4' S > < !
       < !         5 4                  @    &  $   E2                                    C "
                                         + $ @                                        G9+ $       C




                                              [10].I H /E=

       !       )       29       ;F        $      @ "               & '               )'           •

                                                                                                      :)               1
< "        $       (                1               )         /'         !           !            !                        9
 '         ; <                  !        " (         <       !            >          <                                     40
                                                                                                      +<           !
                                                                   : $       ? 4'-                O                        0
      L< ? 'F L<  :                     > !                 O 29 $                            !                )"
)'          5 4 < !                             3       P/ O=   $        !                                 O     P       B
                                                             + "             '            /            !               ".



                                                                     !




                                          [2] - I H /E=

                                                                                      :           <            !
           <   D                $       )'              <     !                      <     !  !                        •
:                           .       3 9 L<          !       3 7               "           > ?" 9
                                                                                           •
   )0" 7 .= / >                     ;          /0. < B0           !          E " =<
                      > . >.=                        "     '                     E ! '
       < F                        - E         < E = #!         (                  L3
                  >.       4 <             2 $            >.= <               2 9 ;F
      <      (I        H ' /E 2 ) =                  T0 / <                <" < E
C0"9 2 9 3       !             5 4 & 3 =J ! '                       D            < B0
< ; I           C          (H                    /! 3                   )0"
          7 >           ' 5 ; & >.= E                         E H /( < ! 5
 :/ Q '             '2            % ! U            >          I C (          B 7 .=
                                   >.=                    7 >      E J )0" 2 H
   =                 ;        (E      E       5 .          )0"        ! ' Q6         ;
    E >.=                         0.       E       C "       ' < E )0" $!             29
      " <$ 0 5             >                        E =                    ? .
 ! 4 J 5 ;&               6J < "                                             4 J & '
        6       )0"                   < E      < E                 ) E #! 2
           V         .            ! J ? . ) " E            E        $                >
7 > /             ! /              /4        ! '      ?        >. <               < EE
                                                                         0 V         /(
   4 5 ;&                <0 ! C !             C       29          )' )0"             ;
             /0.               <       S >         2 9 ;F <0            /0       6 9/
       2          1        .            & <      3 ) " >.=             E- ! J9 < F
  2               E            > . /4          ! '         /. ?           >. <
     <        9      ! '                            =! &       / " < F E= />
   E         ; !       E 9 29 =          "        & J        <         2 > . )0"
   7 > ) ' H ! <! ' < E <                                  ; L ;            = /0.
       <              < " < E LQ                6 ? ; )0" > . <                    ,
       ! '           ! > . >.= <                        (E 2 *        *      > 7
                  D             (E $       (      ;              = /6             # !
                                                    54 ' 3 2                  = 5 ;



                                                   :       @       /        '          4       0
                         '   @




<   F 5J


                                           [11]I H/E=




                                              "
                                                                   :            5 .
&; 5 4   $          Q     @      &  )      @ . <E = $                   !
    5 . * 2    G>       $ 2     E +< F   >       <E= @                           ! "
                              +M           @         =                      5      W




                                                                        :        .
                                              :           C            7.
        +                 $  & ' < !                  3       95       ;  •
                            +" )       ' Q                                •
                     +    < E        8 :& '       !                       •
                       +     <X=     8
                  + > >. 1       C   8
              +V ++++    'F      < ' 8




                               #
References :

[1] C. Office of Technology, "Security Awareness Newsletter", COT Division of Security
services, October 2004, volumeII, Issue 4.

[2] Commonwealth Office of Technology,http://gotsource.ky.gov/dsweb/get/document-
40461/SA+NewsLetter, , published by the COT Division of Security Services, October 2004,
Volume II, Issue 4

[3] M. CIAMPA ,"Security+ guide to network security fundamentals", 2nd edition,
    Canada: Course Technology, 2005.

http://www.al-jazirah.com.sa/digimag/02012005/wr37.htm[4]

[5] A. Mohammed,"Aljazirah Office : Security Awareness" ,Cairo, 2002.


[6] security focus, www.securityfocus.com/archieve/132/353712, protecting password, message
to security management, US-CERT securityawareness tips, Feb 12 2004.

[7]Semantic Corporation, April 23 2005,
http://securityresponse.symantic.com/avcenter/security/content/security.articles/corp.security.poli
cy.html.

[8] azgita gov, April 5 2004,
http://azgita.gov/policies_standards/html/p800_s895_security_trng.htm.

[9] Insight company, april 23 2005, http://www.insight.co.uk/training/training.htm

[10]http://securityresponse.symantec.com/avcenter/security/Content/security.articles/corp.securit
y.policy.html
[11] Infosec corporation, april 23
2005,http://www.infosec.co.uk/ExhibitorLibrary/131/ProactiveNetworkSecurity.pdf, Circle
Proactive Network Security.




                                               $

								
To top